標(biāo)題: Titlebook: Computer and Information Sciences; 31st International S Tadeusz Czachórski,Erol Gelenbe,Ricardo Lent Conference proceedings‘‘‘‘‘‘‘‘ 2016 Th [打印本頁] 作者: 憑票入場 時間: 2025-3-21 16:06
書目名稱Computer and Information Sciences影響因子(影響力)
書目名稱Computer and Information Sciences影響因子(影響力)學(xué)科排名
書目名稱Computer and Information Sciences網(wǎng)絡(luò)公開度
書目名稱Computer and Information Sciences網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer and Information Sciences被引頻次
書目名稱Computer and Information Sciences被引頻次學(xué)科排名
書目名稱Computer and Information Sciences年度引用
書目名稱Computer and Information Sciences年度引用學(xué)科排名
書目名稱Computer and Information Sciences讀者反饋
書目名稱Computer and Information Sciences讀者反饋學(xué)科排名
作者: 外星人 時間: 2025-3-21 22:48
Brandon P. Brown,Jason T. Eberl Ph.D, it is often a time-consuming task and needs to be performed under a restricted computational budget. In this study, the results from our previous work on using the Taguchi method to tune the parameters of a memetic algorithm for cross-domain search are further analysed and extended. Although the T作者: 慢慢沖刷 時間: 2025-3-22 02:03
Brandon P. Brown,Jason T. Eberl Ph.Dnce is a crucial component of selection hyper-heuristics, deciding whether to accept or reject a new solution at each step during the search process. This study investigates group decision making strategies as ensemble methods exploiting the strengths of multiple move acceptance methods for improved作者: Fallibility 時間: 2025-3-22 05:30 作者: myopia 時間: 2025-3-22 12:25 作者: Compassionate 時間: 2025-3-22 14:51 作者: Compassionate 時間: 2025-3-22 20:26 作者: 使成波狀 時間: 2025-3-23 00:38 作者: Culmination 時間: 2025-3-23 04:32
The Ethics of Information Warfareand evaluation based on specially created test datasets. Sometimes preparation of test sets can be troublesome. Another problem appears when discretization of input sets is taken into account. It is not obvious how to discretize test datasets. Therefore model evaluation method not requiring test set作者: VALID 時間: 2025-3-23 06:49
Luciano Floridi,Mariarosaria Taddeolity issues mainly due to the evaluation of large search spaces. Evaluation of the search space cosists translating candidate concept descriptor into SQL queries, which involve a number of equijoins on several tables, and running them against the dataset. We aim to improve time efficiency of such sy作者: averse 時間: 2025-3-23 12:11 作者: 暴露他抗議 時間: 2025-3-23 17:48 作者: 幸福愉悅感 時間: 2025-3-23 21:54
Farm Animal Welfare: A Systemic Challenge, from the environment at random rates. These packets can be stored in node buffers as discrete packet forms which were previously introduced in “Energy Packet Network” paradigm. We consider a standby energy loss in the energy buffer (battery or capacitor) in a random rate, due to the fact that energ作者: 逗它小傻瓜 時間: 2025-3-24 01:51
https://doi.org/10.1007/978-1-4020-8722-6networks with a restart signal, multiple classes or positive customers, PS discipline and arbitrary PH service distribution. The restart signal models the possibility to abort a task and send it again after changing its class and its service distribution. These networks have been proved to have a pr作者: fledged 時間: 2025-3-24 03:22 作者: 1分開 時間: 2025-3-24 08:13
Computer and Information Sciences978-3-319-47217-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Trochlea 時間: 2025-3-24 14:18 作者: SPALL 時間: 2025-3-24 17:12
https://doi.org/10.1007/978-3-031-07183-6 a testbed for the algorithmic stochastic comparisons of stochastic matrices and Markov chains, is now a general purpose framework which can be used for the Markovian modelling in education and research.作者: 忍受 時間: 2025-3-24 19:14
https://doi.org/10.1007/978-3-319-47217-1algorithms; artificial intelligence; computer networks; computer science; evolutionary algorithms; geneti作者: 勉強 時間: 2025-3-25 01:23
978-3-319-47216-4The Editor(s) (if applicable) and The Author(s) 2016作者: 蔓藤圖飾 時間: 2025-3-25 04:24
Tadeusz Czachórski,Erol Gelenbe,Ricardo LentIncludes supplementary material: 作者: 連接 時間: 2025-3-25 10:40
Communications in Computer and Information Sciencehttp://image.papertrans.cn/c/image/234371.jpg作者: 座右銘 時間: 2025-3-25 15:06
Some Applications of Multiple Classes G-Networks with Restartnetworks with a restart signal, multiple classes or positive customers, PS discipline and arbitrary PH service distribution. The restart signal models the possibility to abort a task and send it again after changing its class and its service distribution. These networks have been proved to have a product form steady-state distribution.作者: MEAN 時間: 2025-3-25 17:14 作者: 繁忙 時間: 2025-3-25 20:35
1865-0929 tion Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016...The?29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on?smart algorithms;?data classification and processing;?stochastic modelling;?performance 作者: atrophy 時間: 2025-3-26 03:44
Brandon P. Brown,Jason T. Eberl Ph.DThis study investigates group decision making strategies as ensemble methods exploiting the strengths of multiple move acceptance methods for improved performance. The empirical results indicate the success of the proposed methods across six combinatorial optimisation problems from a benchmark as well as an examination timetabling problem.作者: Abrade 時間: 2025-3-26 05:27 作者: miniature 時間: 2025-3-26 08:55
SpringerBriefs in Environmental Sciencees of faults. We performed an evaluation with an industrial case study from the telecommunications domain. We were able to detect real faults with checkers that were generated based on the analysis of execution logs.作者: 北極人 時間: 2025-3-26 16:25
Caterina Metaxotou,Ariadni Mavrou ability. Our proposed algorithm can be considered as one of the best performing algorithms with its 66 times faster computation speed that enables to explore the search space more effectively than any of its counterparts.作者: archetype 時間: 2025-3-26 18:06 作者: Gudgeon 時間: 2025-3-27 00:08
https://doi.org/10.1007/978-3-319-04135-3arning algorithm to classify a new android malware. We extract a fairly adequate set of malware features and we evaluate a machine learning based classification method. The runtime model is built and it can be implemented to detect variants of an android malware. The metrics illustrate the effectiveness of the proposed classification method.作者: 觀點 時間: 2025-3-27 04:44 作者: 無聊點好 時間: 2025-3-27 08:47 作者: 微塵 時間: 2025-3-27 13:26
A Novel Multi-criteria Inventory Classification Approach: Artificial Bee Colony Algorithm with VIKORhe objective function. The results of our proposed approach were obtained from a widely used data set in the literature, and outperforms the existing classification models from the literature, by obtaining better inventory cost.作者: angina-pectoris 時間: 2025-3-27 17:28
Android Malware Classification by Applying Online Machine Learningarning algorithm to classify a new android malware. We extract a fairly adequate set of malware features and we evaluate a machine learning based classification method. The runtime model is built and it can be implemented to detect variants of an android malware. The metrics illustrate the effectiveness of the proposed classification method.作者: Hyperalgesia 時間: 2025-3-27 20:03 作者: 集聚成團 時間: 2025-3-28 01:05 作者: Contracture 時間: 2025-3-28 05:46
The Ethics of Energy Sustainabilityeferences. Our ISA tracks the user’s preferences and makes a selection on the output of one or more search engines using the preferences that it has learned. We also introduce a “relevance metric” to compare the performance of our Intelligent Search Assistant against a few search engines, showing that it provides better performance.作者: 爭吵 時間: 2025-3-28 09:25
The Ethics of Information Warfarequality of prepared decision system. The set of classifiers was selected and different discretization algorithms were applied to obtain method invariant outcomes. The comparative results of experiments performed using cross-validation and test sets approaches to system evaluation, and conclusions are presented.作者: 刺耳 時間: 2025-3-28 10:50 作者: covert 時間: 2025-3-28 18:34
Information Warfare and Just War Theorys, and there are other areas in which important deficiencies exist as well. We point out those discovered deficiencies, and propose remedies for them, laying the foundation for a more tractable and useful formalism for specifying semantic web services.作者: anchor 時間: 2025-3-28 21:23
An Adaptive Heuristic Approach for the Multiple Depot Automated Transit Network Problemtic approach as the proposed problem is NP-Hard. Experiments are run on a carefully generated instances based on the works from the literature. The numerical results show that the proposed algorithm is competitive as it founds a small gap relative to a lower bound values from the literature.作者: 熱情贊揚 時間: 2025-3-28 23:00 作者: 消音器 時間: 2025-3-29 05:31
Comparison of Cross-Validation and Test Sets Approaches to Evaluation of Classifiers in Authorship Aquality of prepared decision system. The set of classifiers was selected and different discretization algorithms were applied to obtain method invariant outcomes. The comparative results of experiments performed using cross-validation and test sets approaches to system evaluation, and conclusions are presented.作者: 規(guī)范要多 時間: 2025-3-29 10:40 作者: 嚴(yán)厲譴責(zé) 時間: 2025-3-29 13:07
A Critical Evaluation of Web Service Modeling Ontology and Web Service Modeling Languages, and there are other areas in which important deficiencies exist as well. We point out those discovered deficiencies, and propose remedies for them, laying the foundation for a more tractable and useful formalism for specifying semantic web services.作者: Volatile-Oils 時間: 2025-3-29 16:21 作者: NIL 時間: 2025-3-29 20:55
Conference proceedings‘‘‘‘‘‘‘‘ 2016opical sections on?smart algorithms;?data classification and processing;?stochastic modelling;?performance evaluation; queuing systems; wireless networks and security;?image processing and computer vision..作者: Emasculate 時間: 2025-3-29 23:56
1865-0929 submissions. The papers are organized in topical sections on?smart algorithms;?data classification and processing;?stochastic modelling;?performance evaluation; queuing systems; wireless networks and security;?image processing and computer vision..978-3-319-47216-4978-3-319-47217-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 雄辯 時間: 2025-3-30 06:37 作者: GRIEF 時間: 2025-3-30 10:11
An Adaptive Heuristic Approach for the Multiple Depot Automated Transit Network Problemice. Within this context of ATN, this study tries to deal with a specific routing problem arising in the context of a ATN’s network with a multiple depot topology. More specifically, we present an optimization routing model for automated transit networks which can be used to strategically evaluate d作者: 真繁榮 時間: 2025-3-30 13:16
An Analysis of the Taguchi Method for Tuning a Memetic Algorithm with Reduced Computational Time Bud, it is often a time-consuming task and needs to be performed under a restricted computational budget. In this study, the results from our previous work on using the Taguchi method to tune the parameters of a memetic algorithm for cross-domain search are further analysed and extended. Although the T作者: Radiculopathy 時間: 2025-3-30 16:51
Ensemble Move Acceptance in Selection Hyper-heuristicsnce is a crucial component of selection hyper-heuristics, deciding whether to accept or reject a new solution at each step during the search process. This study investigates group decision making strategies as ensemble methods exploiting the strengths of multiple move acceptance methods for improved作者: GROUP 時間: 2025-3-31 00:34
Extending Static Code Analysis with Application-Specific Rules by Analyzing Runtime Execution Tracescation of these rules. However, such rules are usually not documented explicitly. Moreover, the implementation of specialized checkers is a manual process that requires expertise. In this work, application-specific programming rules are automatically extracted from execution traces collected at runt作者: congenial 時間: 2025-3-31 01:19
The Random Neural Network Applied to an Intelligent Search Assistantre influenced by the users’ own ambiguity in formulating their requests or queries as well as by the commercial interest of Web search engines and Internet users that want to reach a wider audience. This paper presents an Intelligent Search Assistant (ISA) based on a Random Neural Network that acts 作者: Tonometry 時間: 2025-3-31 06:57
A Novel Grouping Genetic Algorithm for the One-Dimensional Bin Packing Problem on GPUnumber of bins. Large problem instances of the 1D-BPP cannot be solved exactly due to the intractable nature of the problem. In this study, we propose an efficient Grouping Genetic Algorithm (GGA) by harnessing the power of the Graphics Processing Unit (GPU) using CUDA. The time consuming crossover